What you are missing is how browsers work and how antivirus products intercept them to scan the results (just as the person who replied to you in the torpark forum did).
The antivirus products all have the same problem. Every browser works a different way internally, there are no standards for how browsers work internally and there is no such thing as a quarantine cache in any browser.
The only common feature in all browsers is that they send http requests to http servers at port 80, period - end of common features.
avast and others place a low level intercept in the operating system so that any requests (made by any process attempting to make a connection outbound to any server at port 80) is instead routed to the handler that avast has set up (in this case running at localhost port 12080). This passes the request to avast, avast then issues the request to the real server so that the results come back first to avast and can be scanned for infection. If the response in clean it is passed back to the browser - which was completely unaware of the intercept.
This all works perfectly well for all well known browsers.
It should work with torpark when we tell avast to intercept port 9050. I pretty much suspect that the developer has, as part of his concern for privacy, decided to ignore requests that are redirected to the tor process instead of coming directly from portable Firefox. After all - that redirect might be from code placed by a security agency. The same developer has effectively told users (in the quote I posted) that it does not matter that an antivirus product scan the results of the web accesses too. I can only suggest that this is an issue that you could take up directly with the product developer.
I doubt that one Web browser or one antivirus will be modified to work with torpark. The
major browsers are used by hundreds of millions, the antivirus products by at least tens of millions, torpark may attract a few thousand users. In the places where torpark will be really useful all access to the tor servers will be blocked, in other places it will probably be thought (however unreasonably) that anyone wanting to use torpark is doing so for unsavory or dangerous purposes. In any of these cases - major software developers will not want to be seen as catering to those causes.
Incidentally, your concept of a quarantine cache was one that the developers of Thunderbird came up with for email - apparently in total isolation and without consultation with antivirus producers. I have heard of it working with one antivirus product - all of my tests show it not working with any antivirus I have tried. The same developer of torpark has produced torbird - an email equivalent based on Thunderbird. Users of that may also find that their email cannot be scanned by an antivirus product too.